Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0791 Red Hat Advanced Cluster Management 2.0.8 security and bug fix update 4 March 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat Advanced Cluster Management 2.0.8 Publisher: Red Hat Operating System: Red Hat Impact/Access: Increased Privileges -- Existing Account Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-20230 CVE-2021-3121 CVE-2020-35513 CVE-2020-29661 CVE-2020-25705 CVE-2020-15436 CVE-2020-14351 CVE-2020-12723 CVE-2020-10878 CVE-2020-10543 Reference: ESB-2021.0768 ESB-2021.0371 Original Bulletin: https://access.redhat.com/errata/RHSA-2021:0719 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Advanced Cluster Management 2.0.8 security and bug fix update Advisory ID: RHSA-2021:0719-01 Product: Red Hat ACM Advisory URL: https://access.redhat.com/errata/RHSA-2021:0719 Issue date: 2021-03-03 Keywords: management cluster Kubernetes CVE Names: CVE-2020-10543 CVE-2020-10878 CVE-2020-12723 CVE-2020-14351 CVE-2020-15436 CVE-2020-25705 CVE-2020-29661 CVE-2020-35513 CVE-2021-3121 CVE-2021-20230 ===================================================================== 1. Summary: Red Hat Advanced Cluster Management for Kubernetes 2.0.8 General Availability release, which fixes bugs and security issues. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Advanced Cluster Management for Kubernetes 2.0.8 images. Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single consoleâ\x{128}\x{148}with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which resolve some security issues and bugs. See the following Release Notes documentation, which will be updated shortly for this release, for details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.0/html/release_notes/ Security fixes: * multicloud-operators-foundation: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121) * gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121) For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug fix: * RHACM 2.0.8 images (BZ #1915461) 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.0/html-single/install/index#installing 4. Bugs fixed (https://bugzilla.redhat.com/): 1915461 - RHACM 2.0.8 images 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 5. References: https://access.redhat.com/security/cve/CVE-2020-10543 https://access.redhat.com/security/cve/CVE-2020-10878 https://access.redhat.com/security/cve/CVE-2020-12723 https://access.redhat.com/security/cve/CVE-2020-14351 https://access.redhat.com/security/cve/CVE-2020-15436 https://access.redhat.com/security/cve/CVE-2020-25705 https://access.redhat.com/security/cve/CVE-2020-29661 https://access.redhat.com/security/cve/CVE-2020-35513 https://access.redhat.com/security/cve/CVE-2021-3121 https://access.redhat.com/security/cve/CVE-2021-20230 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/cve/CVE-2021-3121 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYEA2htzjgjWX9erEAQjOpQ//VxAhLbuMApVkRHwdeGpDaH2xjS9PKjUf o7xHj9VssEVfOu/C+ABscpSgCyg1cQ3ofTOWApHSKoWiH0yBxersPnh0eE/PTA3x 6zxPnP0nlHsS1Gb11ilmfD2dxHTc/MyNRdFWL+TrMFC681CNYCVT4DsxPMqvdTl0 rtumpdc2bcAnH+1+CG760e/9FKjzpOIgU93jZ84RMgBp0RUVGKH/uFQRc6q9lNAo nyAqoHPBjc78XXLM5nt8DDGf7LyV1teWYSo8GlJ6Yk8F3A9S1DZtTx9gWzmFffjF tjAoLOYcwVVLfAr6B7YYwomPEKKQm5OANhsX9Xcqg6EgFQ7GW+MA5IsiUvFSLKSK Z5GyPVkZQflw4YrcGq7zYRSAh9ldQkqfKzddqL3aQD/7jeTxBAAWHf9gPXj7QIju 38dr0spPQLMhzaQ0CgzzDcF9NN67d5UL5SsLiZuOGsmrAT6kzIGYAXA8u4L8LuvS w48Z551hj9twOnZADWrowT/MKIw/K8h3S+fwcUF9zKNhC1+kdhn9ElpuX/nKNZQw JsKo8X5nKWpE7SLpg7z1lrgyZb6S0zF9ZKVTDWkZyyEnrErdFUse9qlIT+SH8ZSY I4BShnVoRMVLfHxAdlnRUcVsLD+CGtnve8j3LsEtp31UVoDqNipgCcyiULZMkfOI L+MGJVA4IYI= =XDxY - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYEByPONLKJtyKPYoAQjeoQ/9G4LdxEgODMexzNVPbdQXWAd1XcR1PpDP FLT9GXBU9ySvDsuBJOQCw709UYcTi5bn2+E5aAzeDI9R5Hep1vugbqe9aNzrF6Uh YobagVevalJMpbtPvZgW+bGc+uUENKVyXGg4FCkDdwfQ7MV0gXJ8BJ9v43HQEwqf fTHtKcYr4lHlIjyygQFUZBSu0Ke9YyXerqtBZjgbNOr23IRbK8FRdT5lr+qGjpBp SMDWh9aRix4p56l/10ZKO1QMb4FD/FYqByApk6yOYnEJjODEntdVYL/Z8z5gda8e 81LyuiyfPGwcpyfn4jwNhgneFrRIZ7dmMSgPLUuFdaqo4eWXQYehtqVbtoOQQVcz RwtQtrGZUONyBCuNLU2YI3ETZC4kZbYgYlXhsbF1SKOBEKw6RRNUMHZE99MItTPi HgO5P41Xx146XRnk5GcBld2X6gxueEQLR17SMLt47NtYSQNv9MZkgHLQ+1/i75kn nv0hXSxQML1FvWXXmWN5o2J4RlIFWSn48w+uWlIsYbrsUtlycJLcxgmIN9f2EyDW a4aer6ihOOqTQ0ityCZMUkPwaX4brghxpJeT1vwC4PPDUNtBFqPFvfSV6KFLr3lY VT2iNZfN0sEjRNmevvD9PHYYboKtMlfHT9qFanlTmWvzU2+UdrAGPUJgItNtnt39 ZIGzGtqegqg= =7+k3 -----END PGP SIGNATURE-----